General

  • Target

    1c86ee1d365282ce9f727b1db2760260bf87e33208b61593d85830955c77563e

  • Size

    97KB

  • Sample

    241002-cmm31ssbjk

  • MD5

    6b2c6ce1b282391119007e77ee34013c

  • SHA1

    cb800210b5fb824f2c0d53ef49654336bc1e0620

  • SHA256

    1c86ee1d365282ce9f727b1db2760260bf87e33208b61593d85830955c77563e

  • SHA512

    41e3d0dc53a9ac95863878e1bfe619d47679174de35394faedcf83ff5785b3cc3a86de27b38216248a0974afaaf6bc3f87dcb86e452fec037c7dd7835f2b1c01

  • SSDEEP

    3072:20aY46tGNttyeQLYm1wf8l2CHRGgKTBfik:L46tGdye41saQgKTBKk

Malware Config

Targets

    • Target

      1c86ee1d365282ce9f727b1db2760260bf87e33208b61593d85830955c77563e

    • Size

      97KB

    • MD5

      6b2c6ce1b282391119007e77ee34013c

    • SHA1

      cb800210b5fb824f2c0d53ef49654336bc1e0620

    • SHA256

      1c86ee1d365282ce9f727b1db2760260bf87e33208b61593d85830955c77563e

    • SHA512

      41e3d0dc53a9ac95863878e1bfe619d47679174de35394faedcf83ff5785b3cc3a86de27b38216248a0974afaaf6bc3f87dcb86e452fec037c7dd7835f2b1c01

    • SSDEEP

      3072:20aY46tGNttyeQLYm1wf8l2CHRGgKTBfik:L46tGdye41saQgKTBKk

    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks